Includes firms specialized in offering comprehensive
professional cyber security consultancy to other
organizations on how to prepare for, avoid and
protect themselves against cyber-attacks and
threats, such threats might involve networks,
computers, programs and data damage or unauthorized
access.
Includes reselling jamming equipment that interferes
with wireless communications, such as cordless
telephones and GSM repeaters.
Includes reselling the set of application software
for jamming or interfering with wireless
communications such as cell phone calls, cordless
telephones and GSM repeaters, text messages, GPS
systems and Wi-Fi networks.
Equipment for encryption solutions that protect
sensitive data across enterprise applications data
processing IT, critical transactions, storage and
big data platforms.
Software for encryption solutions that protect
sensitive data across enterprise applications data
processing IT, critical transactions, storage and
big data platforms.
Includes companies that offer elements of cloud
computing, such as software or platform as services
provided in the cloud.
Includes firms which help others with the essential
tools needed to identify and assess cyber threats
which might include users themselves, networks,
devices, all software, processes, information in
storage, applications, including recommending
effective measures to eliminate or manage cyber
threats.
Includes designing the organization’s specific
protective objectives that address the necessities
and potential risks involved in the or damage to the
hardware, software or the information on them.
Includes firms engaged in auditing the
organizations’ compliance with the standards and
documented procedures that identify risks and
vulnerabilities within the existing IT environment,
also, conducting penetration testing to the
established security measure for possible breaches
and the exploitable vulnerabilities that an attacker
might gain unauthorized access.
Includes firms hosting and maintaining an
organization’s owned servers, including space,
power, cooling and network resources.
Includes providing comprehensive professional
consultancies to IT organizations to help them match
their needs with the networking solutions, it
involves securing, analyzing and designing network
solutions that maintain the security and integrity
of their IT assets, the minimal qualifications
required is bachelor degree in computer sciences or
information technology, along with three years
hands-on experience.
Includes providing technical services and
consultancies with respect to information technology
and applications like internet, internet and data
warehousing to enhance the administrative and
technical performance in different corporations. In
addition to offering consultancies, to involve
proposing the adequate software and handling the
surveys and studies to determine the appropriate
technology consistent with the nature of the firm,
these firms are not entitled to market or produce
any of the software or products related to said
technology, the minimal degree required is BSc in
computer sciences or information technology, along
with three years hands-on experience.
Includes firms specialized in laying the technical
foundations of the information technology, which
comprises the network, the systems and the data
bases. It also involves firms engaged in preparing
the consultative studies along with the
installations of the network and the systems.
Includes firms specialized in providing the services
of subscribing and connecting to international
information networking, as well as specialized
information banks and exchange of electronic mail.
Which includes operating systems and applications
such as electronic mail and the exchange of data
electronically by using communication networks as
well as their local and international lines. The
role of those is limited to facilitating
subscription procedures against fees or specified
amount.